Customers rely on SEAM to provide a clearly defined and documented data destruction solution.

SEAM offers a wide range of comprehensive data destruction services in accordance with NIST Special Publication 800-88 (Revision 1) standards to ensure confidential information is never compromised. Certificates of Destruction and Recycling are provided regardless of the service chosen (on or off-site data shredding or data erasure). Depending on the customer needs, security carts and witnessed destruction is also available.

Detailed reporting and strict data security protocols ensure all devices are handled securely and in compliance with the dynamic, ever-changing regulation environment of today.  Our team of experts continually researches and stays updated on current legislation and trends so you don’t have to.

"Industry analysts estimate that 80% of corporate laptop and desktop PCs contain sensitive data. The percentage of enterprise servers with sensitive data is even higher."

- Seagate Technology

SEAM offers two methods of data destruction:

Physical Shredding

Data containing devices (computers, cell phones, tablets, etc) and removable storage devices (USB drives, CD's, DVDs, tapes) are separated and physically destroyed using SEAM’s industrial shredder, either on-site at the customer's location or off-site at SEAM’s secure facility in compliance with NIST SP 800-88r1 standards.

Learn More


Data Wiping

SEAM utilizes secure data erasure software in compliance with Revision 1 of the National Institute of Standards and Technology (NIST) Special Publication Series 800-88, which is the industry recognized standard for complete data sanitization, higher than the U.S. Department of Defense Sanitizing (DoD 5220.22-M) standards outlined in the National Industrial Security Program (NISP) Operating Manual.

Learn More

Certificates of Destruction and Recycling are provided for both destruction methods. Other reporting is also available.

Learn More

Learn about SEAM's Security Carts and Bins:


Why You Should Care:

Most security programs are focused on protecting the network, leaving retired or off-network physical assets overlooked.  With huge amounts of private data being collected and managed every day, the need to secure data-containing equipment all stages of the lifecycle is more important than ever. A 2015 study by Blancco Technology Group and Kroll Ontrack found an alarming 48% of the hard disk drives and solid state drives they tested contained residual data. They also found ineffective deletion attempts had been made on 75% of the devices containing information. In some cases, 100% of the data was able to be recovered. Make sure you know your data is properly destroyed, and that you know what happens to your equipment once it leaves your possession. Be Sure.

What are you Protecting?

Intellectual property, Corporate financials, Client data, Personally identifiable information (PII), Protected health information (PHI) and Credit card information - All of which could lead to penalties, fines, lawsuits and loss of reputation if placed in the wrong hands.

In 2013, a healthcare company gave their equipment to a vendor who "promised" to destroy their data and dispose of the items for free. The company's computers were found on eBay containing sensitive health records of 2,000 children and 900 adults, plus a number of human resources records. The company ended up paying around $300,000 in fines and underwent legal proceedings.

There's a reason certified, verifiable data destruction is not free.

Read Full Story